A secure channel code‐based scheme for privacy preserving data aggregation in wireless sensor networks

[1]  René Struik,et al.  The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack , 1987, CRYPTO.

[2]  Qinghua Li,et al.  Blind multiuser detection in uplink CDMA with multipath fading: a sequential EM approach , 2004, IEEE Transactions on Communications.

[3]  Deepthi P. Pattathil,et al.  FPGA implementation of highly secure, hardware-efficient QC-LDPC code-based nonlinear cryptosystem for wireless sensor networks , 2017, Int. J. Commun. Syst..

[4]  Deepthi P. Pattathil,et al.  A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code , 2015, Secur. Commun. Networks.

[5]  T. Aaron Gulliver,et al.  New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes , 2014, IET Commun..

[6]  Gaetano Palumbo,et al.  Pseudorandom bit generator based on dynamic linear feedback topology , 2002 .

[7]  Sidi-Mohammed Senouci,et al.  Secure and efficient verification for data aggregation in wireless sensor networks , 2018, Int. J. Netw. Manag..

[8]  Ayoub Otmani,et al.  Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes , 2008, Math. Comput. Sci..

[9]  David Declercq,et al.  Fast decoding algorithm for LDPC over GF(2/sup q/) , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[10]  Thomas Aaron Gulliver,et al.  Code-based security with random interleaving , 2017, IET Commun..

[11]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[12]  A. Ingleton,et al.  The Rank of Circulant Matrices , 1956 .

[13]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Mohammad Reza Aref,et al.  Efficient secure channel coding based on quasi-cyclic low-density parity-check codes , 2009, IET Commun..

[16]  Zongwang Li,et al.  Efficient encoding of quasi-cyclic low-density parity-check codes , 2006, IEEE Trans. Commun..

[17]  J. Pollard,et al.  Monte Carlo methods for index computation () , 1978 .

[18]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[19]  T. Aaron Gulliver,et al.  A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors , 2016, IEEE Communications Letters.

[20]  David J. C. MacKay,et al.  Low-density parity check codes over GF(q) , 1998, IEEE Communications Letters.

[21]  Kyung-Ah Shim,et al.  A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[22]  Devesh C. Jinwala,et al.  Concealed data aggregation in wireless sensor networks: A comprehensive survey , 2016, Comput. Networks.

[23]  Ping Zhang,et al.  Multi-functional secure data aggregation schemes for WSNs , 2018, Ad Hoc Networks.

[24]  T. Aaron Gulliver,et al.  Joint channel coding-cryptography based on random insertions and deletions in quasi-cyclic-low-density parity check codes , 2015, IET Commun..

[25]  Deepthi P. Pattathil,et al.  Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size , 2017, Wirel. Pers. Commun..

[26]  Marco Baldi,et al.  Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.

[27]  T. R. N. Rao,et al.  Private-Key Algebraic-Coded Cryptosystems , 1986, CRYPTO.

[28]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[29]  David Declercq,et al.  Decoding Algorithms for Nonbinary LDPC Codes Over GF$(q)$ , 2007, IEEE Transactions on Communications.

[30]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.